Search

Paul V. Kulik

Examiner (ID: 8515)

Most Active Art Unit
2307
Art Unit(s)
2776, 2177, 2307, 2771, 2777
Total Applications
657
Issued Applications
529
Pending Applications
25
Abandoned Applications
103

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5004126 [patent_doc_number] => 20070201694 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-30 [patent_title] => 'PRIVACY MANAGEMENT IN IMAGING SYSTEM' [patent_app_type] => utility [patent_app_number] => 11/688571 [patent_app_country] => US [patent_app_date] => 2007-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 13528 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0201/20070201694.pdf [firstpage_image] =>[orig_patent_app_number] => 11688571 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/688571
PRIVACY MANAGEMENT IN IMAGING SYSTEM Mar 19, 2007 Abandoned
Array ( [id] => 8594851 [patent_doc_number] => 08352734 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-01-08 [patent_title] => 'Method for updating the firmware of a security module' [patent_app_type] => utility [patent_app_number] => 11/656468 [patent_app_country] => US [patent_app_date] => 2007-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 3298 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 412 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11656468 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/656468
Method for updating the firmware of a security module Jan 22, 2007 Issued
Array ( [id] => 8297587 [patent_doc_number] => 08225388 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-17 [patent_title] => 'Method and apparatus for authorizing the transfer of information' [patent_app_type] => utility [patent_app_number] => 11/625004 [patent_app_country] => US [patent_app_date] => 2007-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 24 [patent_no_of_words] => 7427 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 318 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11625004 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/625004
Method and apparatus for authorizing the transfer of information Jan 18, 2007 Issued
Array ( [id] => 4869561 [patent_doc_number] => 20080148388 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-06-19 [patent_title] => 'Platform authentication via a transparent second factor' [patent_app_type] => utility [patent_app_number] => 11/586283 [patent_app_country] => US [patent_app_date] => 2006-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6602 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0148/20080148388.pdf [firstpage_image] =>[orig_patent_app_number] => 11586283 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/586283
Platform authentication via a transparent second factor Oct 24, 2006 Issued
Array ( [id] => 9695396 [patent_doc_number] => 08826024 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-02 [patent_title] => 'Trusted compliance operations inside secure computing boundaries' [patent_app_type] => utility [patent_app_number] => 11/584859 [patent_app_country] => US [patent_app_date] => 2006-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 14 [patent_no_of_words] => 8455 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11584859 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/584859
Trusted compliance operations inside secure computing boundaries Oct 22, 2006 Issued
Array ( [id] => 9680877 [patent_doc_number] => 08819806 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-26 [patent_title] => 'Integrated data access' [patent_app_type] => utility [patent_app_number] => 11/584098 [patent_app_country] => US [patent_app_date] => 2006-10-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 9818 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 303 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11584098 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/584098
Integrated data access Oct 19, 2006 Issued
Array ( [id] => 4917614 [patent_doc_number] => 20080098215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-04-24 [patent_title] => 'Tracking of resource utilization during cryptographic transformations' [patent_app_type] => utility [patent_app_number] => 11/584195 [patent_app_country] => US [patent_app_date] => 2006-10-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5453 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0098/20080098215.pdf [firstpage_image] =>[orig_patent_app_number] => 11584195 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/584195
Tracking of resource utilization during cryptographic transformations Oct 19, 2006 Issued
Array ( [id] => 9049513 [patent_doc_number] => 08544071 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-09-24 [patent_title] => 'Systems and methods for software application security management' [patent_app_type] => utility [patent_app_number] => 11/584773 [patent_app_country] => US [patent_app_date] => 2006-10-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 12 [patent_no_of_words] => 7951 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 243 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11584773 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/584773
Systems and methods for software application security management Oct 18, 2006 Issued
Array ( [id] => 4917856 [patent_doc_number] => 20080098457 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-04-24 [patent_title] => 'Identity controlled data center' [patent_app_type] => utility [patent_app_number] => 11/583667 [patent_app_country] => US [patent_app_date] => 2006-10-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7407 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0098/20080098457.pdf [firstpage_image] =>[orig_patent_app_number] => 11583667 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/583667
Identity controlled data center Oct 18, 2006 Issued
Array ( [id] => 4826664 [patent_doc_number] => 20080229406 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-09-18 [patent_title] => 'Method and apparatus for exclusively controlling a device in a home network' [patent_app_type] => utility [patent_app_number] => 11/583090 [patent_app_country] => US [patent_app_date] => 2006-10-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4864 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0229/20080229406.pdf [firstpage_image] =>[orig_patent_app_number] => 11583090 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/583090
Method and apparatus for exclusively controlling a device in a home network Oct 18, 2006 Issued
Array ( [id] => 5108742 [patent_doc_number] => 20070067620 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-22 [patent_title] => 'Systems and methods for third-party authentication' [patent_app_type] => utility [patent_app_number] => 11/517129 [patent_app_country] => US [patent_app_date] => 2006-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8695 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0067/20070067620.pdf [firstpage_image] =>[orig_patent_app_number] => 11517129 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/517129
Systems and methods for third-party authentication Sep 5, 2006 Abandoned
Array ( [id] => 4668956 [patent_doc_number] => 20080044016 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-02-21 [patent_title] => 'Detecting duplicate and near-duplicate files' [patent_app_type] => utility [patent_app_number] => 11/499260 [patent_app_country] => US [patent_app_date] => 2006-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8344 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0044/20080044016.pdf [firstpage_image] =>[orig_patent_app_number] => 11499260 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/499260
Detecting duplicate and near-duplicate files Aug 3, 2006 Issued
Array ( [id] => 8546650 [patent_doc_number] => 08321953 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-11-27 [patent_title] => 'Secure storage device with offline code entry' [patent_app_type] => utility [patent_app_number] => 11/486799 [patent_app_country] => US [patent_app_date] => 2006-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5986 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11486799 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/486799
Secure storage device with offline code entry Jul 13, 2006 Issued
Array ( [id] => 5833760 [patent_doc_number] => 20060245590 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-11-02 [patent_title] => 'Method of confirming a secure key exchange' [patent_app_type] => utility [patent_app_number] => 11/479747 [patent_app_country] => US [patent_app_date] => 2006-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5197 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0245/20060245590.pdf [firstpage_image] =>[orig_patent_app_number] => 11479747 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/479747
Method of confirming a secure key exchange Jun 29, 2006 Abandoned
Array ( [id] => 5030011 [patent_doc_number] => 20070271458 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-22 [patent_title] => 'AUTHENTICATING A TAMPER-RESISTANT MODULE IN A BASE STATION ROUTER' [patent_app_type] => utility [patent_app_number] => 11/419626 [patent_app_country] => US [patent_app_date] => 2006-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5969 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0271/20070271458.pdf [firstpage_image] =>[orig_patent_app_number] => 11419626 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/419626
AUTHENTICATING A TAMPER-RESISTANT MODULE IN A BASE STATION ROUTER May 21, 2006 Abandoned
Array ( [id] => 5015386 [patent_doc_number] => 20070258594 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-08 [patent_title] => 'SECURE LOGIN USING A MULTIFACTOR SPLIT ASYMMETRIC CRYPTO-KEY WITH PERSISTENT KEY SECURITY' [patent_app_type] => utility [patent_app_number] => 11/381878 [patent_app_country] => US [patent_app_date] => 2006-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 25309 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0258/20070258594.pdf [firstpage_image] =>[orig_patent_app_number] => 11381878 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/381878
Secure login using a multifactor split asymmetric crypto-key with persistent key security May 4, 2006 Issued
Array ( [id] => 5255116 [patent_doc_number] => 20070136572 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-06-14 [patent_title] => 'Encrypting system to protect digital data and method thereof' [patent_app_type] => utility [patent_app_number] => 11/417112 [patent_app_country] => US [patent_app_date] => 2006-05-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2399 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0136/20070136572.pdf [firstpage_image] =>[orig_patent_app_number] => 11417112 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/417112
Encrypting system to protect digital data and method thereof May 3, 2006 Abandoned
Array ( [id] => 4908742 [patent_doc_number] => 20080019508 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-24 [patent_title] => 'Public key cryptographic methods and systems with rebalancing' [patent_app_type] => utility [patent_app_number] => 11/416903 [patent_app_country] => US [patent_app_date] => 2006-05-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6143 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0019/20080019508.pdf [firstpage_image] =>[orig_patent_app_number] => 11416903 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/416903
Public key cryptographic methods and systems with rebalancing May 2, 2006 Abandoned
Array ( [id] => 7803722 [patent_doc_number] => 08132006 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-03-06 [patent_title] => 'Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE)' [patent_app_type] => utility [patent_app_number] => 11/415558 [patent_app_country] => US [patent_app_date] => 2006-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 15661 [patent_no_of_claims] => 75 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 437 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/132/08132006.pdf [firstpage_image] =>[orig_patent_app_number] => 11415558 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/415558
Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) Apr 30, 2006 Issued
Array ( [id] => 5226699 [patent_doc_number] => 20070255966 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-01 [patent_title] => 'Cryptographic circuit with voltage-based tamper detection and response circuitry' [patent_app_type] => utility [patent_app_number] => 11/416005 [patent_app_country] => US [patent_app_date] => 2006-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2499 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0255/20070255966.pdf [firstpage_image] =>[orig_patent_app_number] => 11416005 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/416005
Cryptographic circuit with voltage-based tamper detection and response circuitry Apr 30, 2006 Abandoned
Menu